Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Performance Evaluation Of Video Streaming With Background Traffic Over Ieee 802.11 Wlan Networks, Nicola Cranley, Mark Davis Oct 2005

Performance Evaluation Of Video Streaming With Background Traffic Over Ieee 802.11 Wlan Networks, Nicola Cranley, Mark Davis

Conference papers

There is an increasing demand for multimedia streaming applications over WLAN networks. MPEG-4 and H.264 are compression standards targeted at high-quality streamed multimedia services over wireless best-effort IP networks. However, the dynamic nature of wireless networks in terms of fluctuating bandwidth and time-varying delays makes it difficult to provide good quality streaming under such constraints. Multimedia streaming applications are a demanding and challenging service to deliver over wireless networks. There is a trade-off between the capacity of the wireless network and the quality of the multimedia streaming application. In this paper we investigate the effect the background traffic load has …


Assessing The Quality Of Voip Transmission Affected By Playout Buffer Scheme, Miroslaw Narbutt, Mark Davis Jun 2005

Assessing The Quality Of Voip Transmission Affected By Playout Buffer Scheme, Miroslaw Narbutt, Mark Davis

Conference papers

Delay, echo, encoding scheme, and packet loss all influence perceived quality of conversational speech transmitted over packet networks. Therefore, the choice of a buffer algorithm cannot be solely based on statistical loss/delay trade-off metrics. Also subjective “listening tests” or the newer ITU-T PESQ method, which don’t consider the effect of mouth-to-ear delay are inappropriate. We proposed a method for assessing VoIP call quality by extending the ITU-T E-model concept. This method provides a direct link to perceived conversational speech quality by estimating user satisfaction from the combined effect of information loss, delay and echo.


Performance Analysis Of Network-Level Qos With Encoding Configuration For Unicast Video Streaming Over Ieee 802.11 Wlan Networks, Nicola Cranley, Mark Davis Jan 2005

Performance Analysis Of Network-Level Qos With Encoding Configuration For Unicast Video Streaming Over Ieee 802.11 Wlan Networks, Nicola Cranley, Mark Davis

Conference papers

Video streaming has a large impact on the resource requirements of the WLAN. However, there are many variables involved in video streaming, such as the video content being streamed, how the video is encoded and how it is sent. This makes the role of radio resource management extremely difficult. In this paper we investigate the effect that video encoding configurations has on the network resource requirements for unicast video streaming in a WLAN environment. We compare the network resource requirements of several content types encoded at various encoding configurations with varying I-frame frequencies, target encoding bit rates and hint track …


An Experimental Analysis Of The Call Capacity Of Ieee 802.11b Wireless Local Area Networks For Voip Telephony, Brian Keegan Jan 2005

An Experimental Analysis Of The Call Capacity Of Ieee 802.11b Wireless Local Area Networks For Voip Telephony, Brian Keegan

Masters

The use of the Internet to make phone calls is growing in popularity as the Voice over Internet protocol (VoIP) allows users to make phone calls virtually free of charge. The increased uptake of broadband services by domestic users will further increase the use of VoIP telephony. Furthermore, the emergence of low cost wireless networks (namely IEEE 802.11a/b/g WLANs) is expected to bring wireless VoIP into the mainstream. As the number of wireless hotspots increases more users will want to use VoIP calls wherever possible by connecting to open access points (AP). A major concern with VoIP is Quality of …


Applying Unbalanced Rsa To Authentication And Key Distribution In 802.11, Zhong Zheng, Kemal Tepe, Huapeng Wu Jan 2005

Applying Unbalanced Rsa To Authentication And Key Distribution In 802.11, Zhong Zheng, Kemal Tepe, Huapeng Wu

Electrical and Computer Engineering Publications

It is well known that the data confidentiality algorithm, called Wired Equivalent Privacy (WEP), offerred by the original IEEE 802.11 is not secure mainly due to its improper implementation of RC4 algorithm [3], [4]. The IEEE 802.11 Task Group ’I’ (TGi) has designed two options to address this problem. One is called Temporal Key Integrity Protocol (TKIP), intended to be used as a short-term patch for currently deployed equipment. The other one uses Advanced Encryption Standard (AES), a powerful block cipher recommended by NIST to replace DES in 2000, as a long-term solution